Showing 241 - 260 results of 155,266 for search '"security"', query time: 0.58s Refine Results
  1. 241
  2. 242

    Security and sustainability by Medani P. Bhandari

    Published 2020-12-01
    Subjects: “…security…”
    Get full text
    Article
  3. 243
  4. 244

    Data Security by Diego Lopez

    Published 2013-07-01
    “…There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.). …”
    Get full text
    Article
  5. 245

    Jurisdiction and Security by Erin Gibbs Van Brunschot

    Published 2022-11-01
    “… On June 16, 2022, the Canadian Association for Security and Intelligence Studies (CASIS)-Vancouver hosted a Digital Roundtable titled Jurisdiction and Security, conducted by Dr. …”
    Get full text
    Article
  6. 246
  7. 247

    Secure the Clones by Thomas Jensen, Florent Kirchner, David Pichardie

    Published 2012-05-01
    “…Currently no language-based mechanism supports secure object cloning. This paper proposes a type-based annotation system for defining modular copy policies for class-based object-oriented programs. …”
    Get full text
    Article
  8. 248
  9. 249

    The Burden of Security by Vera Lazzaretti

    Published 2020-03-01
    “…By analysing the evolution of security discourses in local Hindi newspapers and drawing on ethnography of everyday policing at the Kashi Vishvanath-Gyan Vapi compound, this article discusses moral frictions involved in securing a contested place of worship and argues that scopes and objects of securitisation can shift. …”
    Get full text
    Article
  10. 250
  11. 251
  12. 252

    Security on the Internet by Kang, Siew Hwa.

    Published 2008
    “…Due to these benefits, more and more companies are rushing to use the Internet for commercial reasons without considering in-depth security-related risks that are associated with the Internet. …”
    Get full text
    Thesis
  13. 253
  14. 254

    Circuits for security by Muhammad Aznin Bin Abdul Aziz

    Published 2023
    “…This gives rise to a need for better security for the vulnerable IOT. Physical unclonable function (PUF) is one of the techniques that are being used to provide security and SRAM PUF is one of the preferred type of PUF. …”
    Get full text
    Final Year Project (FYP)
  15. 255

    Bluetooth security by Tan, Kheng Teck.

    Published 2008
    “…Then we discuss Bluetooth security that focus on the key management, authentication and encryption.…”
    Get full text
    Thesis
  16. 256

    Cloud security by Hein Htet, Zaw

    Published 2014
    “…However, it still has security issues such as data security. It does not offer the ability to encrypt the block and object storage at the time this project is proposed. …”
    Get full text
    Final Year Project (FYP)
  17. 257

    Information security by Tredinnick, Luke, Laybats, Clarie

    Published 2017
    “…This issue of Business Information Review takes a focused look at Information Security, and the role of information professionals in securing information systems and processes. …”
    Get full text
    Article
  18. 258

    Blinded by security by Brachet, J

    Published 2010
    “…</p><p>The final version of this paper will be published in 2011 by Springer in a volume on the migration-development-security nexus, edited by Thanh-Dam Truong and Desmond R. …”
    Working paper
  19. 259

    Security of supply by Isbell, P, Gault, J, Ramsay, W, Qabazard, H

    Published 2007
    “…Paul Isbell revisits the energy security debate; John Gault considers European security and natural gas supplies; William C. …”
    Journal article
  20. 260

    On secure messaging by Cohn-Gordon, K

    Published 2018
    Subjects:
    Thesis